GIAC Certified Incident Handler
GCIH Exam

Which of the following malicious software travels across computer networks without the assistance of a user?

  1. Worm
  2. Virus
  3. Hoax
  4. Trojan horses

Answer(s): A



What is the major difference between a worm and a Trojan horse?

  1. A worm spreads via e-mail, while a Trojan horse does not.
  2. A worm is a form of malicious program, while a Trojan horse is a utility.
  3. A worm is self replicating, while a Trojan horse is not.
  4. A Trojan horse is a malicious program, while a worm is an anti-virus software.

Answer(s): C



Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.
How was security compromised and how did the firewall respond?

  1. The attack was social engineering and the firewall did not detect it.
  2. Security was not compromised as the webpage was hosted internally.
  3. The attack was Cross Site Scripting and the firewall blocked it.
  4. Security was compromised as keylogger is invisible for firewall.

Answer(s): A



You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients.

What will you do to accomplish this task?
Each correct answer represents a part of the solution. (Choose two.)

  1. Configure a distributed file system (Dfs) on the file server in the network.
  2. Enable the Network File System (NFS) component on the file servers in the network.
  3. Configure ADRMS on the file servers in the network.
  4. Enable User Name Mapping on the file servers in the network.

Answer(s): B,D




950+
I just finished my exam this week. It was a good score of 950+.
- UNITED STATES
Upvote


Abdul
I passed the exam on Monday morning and was amazed at how much this site had covered, fortunately that's it for another three years. The tests really did help so thanks!!
- Doha
Upvote


Rose
I passed that exam the first time. And I thank you folks for that. I could not have passed it with out your help.
- South Africa
Upvote


Shourya
I've just done my exam and passed (890) - your materials are spot on.
- UNITED STATES
Upvote


90%
I have sat and passed.
- Haidarabad
Upvote


Jessica
Thanks to this site! i passed my 310-055 exam with 90%
- UNITED STATES
Upvote


George
I passed my VCP Exam this week with an 87. I hadn't taken a cert exam in 10 years. Your product was very helpful and helped me hone the areas where I was lacking. Thank you.
- UNITED ARAB EMIRATES
Upvote


David B.
I would like to thank this site for the great support and passing 920-105 exam with excellent result. Thanks once again!
- UNITED STATES
Upvote


Bruce Gord
Thanks Well I just passed the exam with high score. Anyway, thanks for providing the good material.
- Malaysia
Upvote


Parag
Hi, Let me appreciate your Study Guide. I passed the exam with 92%. All the questions were from the study guide. I am still wondering where I went wrong for not scoring 100%. I will not hesitate to recommend your site to my friends and colleagues. Thanks
- UNITED STATES
Upvote

Read more ...